1.1 In a multiprogramming and also time-sharing environment several users share the system simultaneously. This instance can an outcome in assorted security problems.What space two together problems?
Stealing or copy one"s program or data using device resources (memory, disk space, peripherals) without ideal accounting.

You are watching: Can traps be generated intentionally by a user program

a. Have the right to we certain the same degree of security in a time-shared an equipment as in a specialized machine? describe your answer.
since any type of protection system devised by humans can inevitably be damaged by a human, and the more complicated the scheme, the more complicated it is to feeling confident of its exactly implementation.
Means of moving from relocating one procedure to another. Allows multiple procedures to take place simultaneously by enabling transfer the control in between system processes and also I/O. Cause switching to kernel mode.
Trap (or exception) is a software-generated interrupt brought about either by one error (division by zero or invalid storage access) or by a specific request from the user regime that an operating-system organization be performed. Interrupts prompted by signal from either hardware or software but not tied come any certain instruction.
Through exemption or clearly call... One interrupt causes system to go into privilege mode (kernel mode).An interrupt is a hardware-generated change-of-flow in ~ the system. One interrupt handler is dubbed to resolve the cause of the interrupt regulate is then returned to the interrupted context and also instruction.
A trap is a software-generated interrupt. One interrupt can be supplied to signal the completion of an I/O to eliminate the require for machine polling.
1.11 direct memory accessibility is provided for high-speed I/O devices in order come avoid enhancing the CPU"s execution load.How does the CPU user interface with the machine to name: coordinates the transfer?
The CPU can initiate a DMA (Direct storage Access) operation by writing values into special registers that can be independently accessed by the device. The maker initiates the equivalent operation as soon as it receives a command native the CPU.
b. The CPU is enabled to execute other programs if the DMA controller is transporting data. Go this process interfere with the execution the the user programs? If sodescribe what forms of interference are caused?
The CPU can initiate a DMA operation by composing values right into special registers that have the right to be separately accessed through the device. The an equipment initiates the matching operation when it receives a command indigenous the CPU. As soon as the maker is finished with its operation, the interrupts the CPU to indicate the perfect of the operation. Both the an equipment and the CPU deserve to be accessing memory simultaneously. The memory controller provides access to the memory bus in a fair manner come these two entities. A CPU might thus be unable to concern memory work at top speeds due to the fact that it has actually to complete with the maker in order to obtain accessibility to the memory bus.
2.2 List 5 services provided by an operation mechanism that space designed to do it much more convenient because that the customers to use the computer system system. In what situations would that be difficult for user-level programs to administer these services? Explain.
The operating system tons the contents (or sections) of a paper into memory and also begins the execution. A user-level program might not be trusted to correctly allocate CPU time.
Disks, tapes, serial lines, and also other tools must be connected with at a really low level. The user require only specify the device and the operation to execute on it while the system converts that request right into device- or controller-specific commands. User-level programs can not be trusted to only accessibility devices they must have access to and also to only accessibility them when they room otherwise unused.
There are numerous details in record creation deletion allocation and naming the users must not need to perform. Blocks of disk an are are provided by files and also must it is in tracked. Deleting a record requires remove the name document information and releasing the allocated blocks. Protections must additionally be confirm to assure proper record access. User programs might neither ensure follow to protection approaches nor be trusted to point out only cost-free blocks and deallocate blocks on paper deletion.
Message passing between systems calls for messages it is in turned into packets of info sent to the network controller transmitted across a interactions medium and also reassembled by the location system. Packet ordering and also data correction must take place. User programs might not coordinate accessibility to the network device, or they could receive packets destined for various other processes.
Error detection wake up at both the hardware and software levels. In ~ the hardware level every data transfers must be inspected come ensure that data have not been corrupted in transit. All data ~ above media must be confirm to be sure they have actually not adjusted since castle were written to the media. In ~ the software application level media have to be checked for data consistency for circumstances do the number of allocated and also unallocated blocks of storage enhance the total number on the device. Over there errors are commonly process-independent (for instance the corruption of data ~ above a disk) therefore there should be a worldwide program (the operating system) that handles all types of errors. Also by having errors handle by the operating mechanism processes need not contain password to catch and correct every the errors possible on a system.
Pass parameters in it is registered b. It is registered pass starting addresses of block of parameters c. Parameters have the right to be placed,or pushed,onto the stack by the program and also popped turn off the stack by the operating system.
In basic the operating mechanism must save the state of the right now running process and restore the state that the process scheduled come be run next. Saving the state the a process typically contains the worths of every the CPU registers in addition to storage allocation. Context switches must also perform countless architecture-specific operations, including flushing data and also instruction caches.

See more: If Egg Is A Chicken Egg A Cell, But That The, Is Egg A Single Cell Or Multiple Cell

5.3 consider the exponential average formula offered to suspect the size of the following CPU burst. What room the effects of assigning the following values to the parameters provided by the algorithm?a. α = 0 and also τ0 = 100 millisecondsb. α = 0.99 and τ0 = 10 milliseconds
the many recent habits of the process is provided much greater weight than the past history associated with the process. Consequently the scheduling algorithm is nearly memory-less and also simply predicts the size of the ahead burst because that the next quantum that CPU execution.
5.5 which of the complying with scheduling algorithms could an outcome in starvation? Which type of starvation?a. First-come, first-servedb. Shortest task firstc. Ring robind. Priority

Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, thomas H. Cormen

Computer Organization and also Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, man L. Hennessy